Digital Library


Search: "[ author: 김광조 ]" (10)
    Unlocking Shared Bike System by Exploiting an Application Log
    , , , Vol. 29, No. 4, pp. 719-728, Aug. 2019
    10.13089/JKIISC.2019.29.4.719

    Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework
    Khalid Huseynov, Vol. 25, No. 4, pp. 807-816, Aug. 2015
    10.13089/JKIISC.2015.25.4.807
    Keywords: botnets, scalability, Hadoop, unsupervised detection

    Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider
    Hye-Won Park, Tomoyuki Asano, Vol. 19, No. 5, pp. 25-34, Oct. 2009
    10.13089/JKIISC.2009.19.5.25
    Keywords: AGKA, Group key agreement, ID-based, Impersonation

    Analysis and Recovery of CIH virus
    , Vol. 9, No. 4, pp. 49-60, Aug. 1999
    10.13089/JKIISC.1999.9.4.49
    Keywords: CIH virus, Anti-Virus, FAT32

    Analysis and Enhancement of Zhou-Gollmann's Non-repudiation Protocol
    , , , Vol. 7, No. 3, pp. 41-52, Jun. 1997
    10.13089/JKIISC.1997.7.3.41

    Classification of Exponent Permutations over finite fields GF($2^n$) and its applications
    Sang-Woo Park, Kwang-Jo Kim, Vol. 6, No. 4, pp. 97-106, Aug. 1996
    10.13089/JKIISC.1996.6.4.97

    Generallization of Semi-bent functions and their Construction Method
    Sang-Woo Park, Seong-Taek Chee, Kwang-Jo Kim, Vol. 6, No. 3, pp. 31-40, Jun. 1996
    10.13089/JKIISC.1996.6.3.31

    On the Correlation Immune Functions and their Nonlinearity
    Soo-Hak Sung, Seong-Taek Chee, Sang-Jin Lee, Kwang-Jo Kim, Vol. 6, No. 3, pp. 11-22, Jun. 1996
    10.13089/JKIISC.1996.6.3.11

    On recursively extended Boolean functions
    Seong-Taek Chee, Sang-Jin Lee, Kwang-Jo Kim, Vol. 5, No. 1, pp. 3-16, Feb. 1995
    10.13089/JKIISC.1995.5.1.3

    On the Cryptogeaphic Signigicance of Bent Functions
    , Vol. 1, No. 1, pp. 85-90, Feb. 1991
    10.13089/JKIISC.1991.1.1.85